The SOC Analyst Tier 3 serves as the senior technical escalation point within the SOC. The role focuses on advanced threat analysis, incident response leadership, detection engineering, threat intelligence integration, and proactive security improvement initiatives.Key ResponsibilitiesLead complex incident investigations and response activities Perform advanced threat huntingDevelop detection logic, analytics, and custom SIEM rules Conduct forensic investigations on endpoints and servers Identify gaps in monitoring and improve SOC visibility Analyze emerging threats, malware, and attack campaigns Mentor Tier 1 and Tier 2 analysts Develop SOC playbooks and response procedures Coordinate with Red Team, Threat Intelligence, and other IT teams Support security architecture and hardening initiativesNon-Technical skillsExcellent analytical and problem-solving skills.Strong interpersonal skills to interact with team members and upper management.Strong collaborative skills.Self-discipline to work according to playbook and time requirements.Passion for cybersecurity and staying up-to-date with current threats, tools and techniques.Willingness to learn new security technologies, products and incident analysis and response approaches.Excellent written and oral communication skills.Qualifications:Minimum of 5-7 years of experience.